Free Malware Removal Forum

Welcome to MalwareRemoval.com,What if we told you that you could get malware removal help from experts, and that it was 100% free? MalwareRemoval.com provides free support for people with infected computers. Our help, and the tools we use are always 100% free. No hidden catch. We simply enjoy helping others. You enjoy a clean, safe computer.

Hi Synchro89,------------------------------------------------Download and Run RkillPlease download and run the tool named Rkill, which may help in allowing other programs to run.There are 4 different versions. If one of them won't run then download and try to run one of the other ones.Vista and Win7 users need to right click Rkill and choose Run as AdministratorYou only need to get ONE of these to run, not all of them. You may get warnings from your antivirus about any of these tools, ignore them or shutdown your antivirus.Please download Rkill from one of the following links and save to your Desktop:Rkill.exeRKill.comRKill.scrRkill.pif

Double-click on the Rkill desktop icon to run the tool.

If using Vista or Windows 7 right-click on it and choose Run As Administrator.

A black DOS box will briefly flash and then disappear. This is normal and indicates the tool ran successfully.

If ir does not, delete the desktop entry. Then download and use the one provided in the next link.

If it does not work, repeat the process and attempt to use one of the remaining links until the tool runs.

Do not reboot until instructed.

If the tool does not run from any of the links provided, please let me know.

Make sure Every other window except HJT is closed (No other tabs showing in the bottom tray), and Click Fix CheckedClick the "X" in the upper right corner of the HiJackThis window to close it.-----------------------------------------------------------REBOOT (RESTART) Your Machine-----------------------------------------------------------Remove Programs Using Control PanelFrom Start, Settings, Control Panel or Start, Control Panel, click Add/Remove Programs.Highlight each Entry, as follows, one by one, if it exists, and choose Remove :Advanced System Care 3

Take extra care in answering questions posed by any Uninstaller.-----------------------------------------------------------REBOOT (RESTART) Your Machine---------------------------------------------Run a Scan with OTL

C:\Documents and Settings\Owner\Application Data\Macromedia\Authorware Web Player\NP32ASW\webplr05\webplr.exe [DETECTION] Contains recognition pattern of the W32/Infector.Gen2 Windows virus [NOTE] The registration for this file was not remedied due to too many multiple detections. For a more exact analysis, please send us this file via Quarantine manager for closer examination. [NOTE] The registration for this file was not remedied due to too many multiple detections. For a more exact analysis, please send us this file via Quarantine manager for closer examination. [NOTE] The file was moved to the quarantine directory under the name '5ebc54cc.qua'.C:\Documents and Settings\Owner\Application Data\Macromedia\Authorware Web Player\NP32ASW\webplr05\vct32161.dll [DETECTION] Is the TR/Crypt.ASPM.Gen Trojan [NOTE] The file was moved to the quarantine directory under the name '3244410d.qua'.C:\Documents and Settings\Owner\Application Data\Macromedia\Authorware Web Player\NP32ASW\webplr05\msvcrt.dll [DETECTION] Is the TR/Crypt.ASPM.Gen Trojan [NOTE] The file was moved to the quarantine directory under the name '769566c2.qua'.C:\Documents and Settings\Owner\Application Data\Macromedia\Authorware Web Player\NP32ASW\webplr05\awiml32.dll [DETECTION] Is the TR/Crypt.ASPM.Gen Trojan [NOTE] The file was moved to the quarantine directory under the name '68a8266f.qua'.C:\Documents and Settings\Owner\Application Data\HP\ScLogs\SolutionCenter.htm [DETECTION] Contains recognition pattern of the HTML/Rce.Gen HTML script virus [NOTE] The registration for this file was not remedied due to too many multiple detections. For a more exact analysis, please send us this file via Quarantine manager for closer examination. [NOTE] The registration for this file was not remedied due to too many multiple detections. For a more exact analysis, please send us this file via Quarantine manager for closer examination. [NOTE] The file was moved to the quarantine directory under the name '08e626c5.qua'.C:\Documents and Settings\Owner\Application Data\Creative\Media Database\JetFileBackup\Msjro.dll [DETECTION] Contains recognition pattern of the W32/Infector.Gen2 Windows virus [NOTE] The registration for this file was not remedied due to too many multiple detections. For a more exact analysis, please send us this file via Quarantine manager for closer examination. [NOTE] The registration for this file was not remedied due to too many multiple detections. For a more exact analysis, please send us this file via Quarantine manager for closer examination. [NOTE] The file was moved to the quarantine directory under the name '57975c08.qua'.C:\Documents and Settings\Owner\Application Data\Creative\Media Database\JetFileBackup\Msadox.dll [DETECTION] Contains recognition pattern of the W32/Infector.Gen2 Windows virus [NOTE] The registration for this file was not remedied due to too many multiple detections. For a more exact analysis, please send us this file via Quarantine manager for closer examination. [NOTE] The registration for this file was not remedied due to too many multiple detections. For a more exact analysis, please send us this file via Quarantine manager for closer examination. [NOTE] The file was moved to the quarantine directory under the name '34997f51.qua'.C:\Documents and Settings\Owner\Application Data\Creative\Media Database\JetFileBackup\Msado15.dll [DETECTION] Contains recognition pattern of the W32/Infector.Gen2 Windows virus [NOTE] The registration for this file was not remedied due to too many multiple detections. For a more exact analysis, please send us this file via Quarantine manager for closer examination. [NOTE] The registration for this file was not remedied due to too many multiple detections. For a more exact analysis, please send us this file via Quarantine manager for closer examination. [NOTE] The file was moved to the quarantine directory under the name '2f9e28ad.qua'.C:\Documents and Settings\NetworkService.NT AUTHORITY\Local Settings\Temporary Internet Files\Content.IE5\WTAZWP2R\suspendedpage[1].htm [DETECTION] Contains recognition pattern of the HTML/Rce.Gen HTML script virus [NOTE] The registration for this file was not remedied due to too many multiple detections. For a more exact analysis, please send us this file via Quarantine manager for closer examination. [NOTE] The registration for this file was not remedied due to too many multiple detections. For a more exact analysis, please send us this file via Quarantine manager for closer examination. [NOTE] The file was moved to the quarantine directory under the name '463d7fc4.qua'.C:\Documents and Settings\NetworkService.NT AUTHORITY\Local Settings\Temporary Internet Files\Content.IE5\WTAZWP2R\site=uken&affiliate=uken&app=js&sapp=js&size=120x90&pp=13&path=%2Fdefault[1].htm [DETECTION] Contains recognition pattern of the HTML/Rce.Gen HTML script virus [NOTE] The registration for this file was not remedied due to too many multiple detections. For a more exact analysis, please send us this file via Quarantine manager for closer examination. [NOTE] The registration for this file was not remedied due to too many multiple detections. For a more exact analysis, please send us this file via Quarantine manager for closer examination. [NOTE] The file was moved to the quarantine directory under the name '4b260bd7.qua'.C:\Documents and Settings\NetworkService.NT AUTHORITY\Local Settings\Temporary Internet Files\Content.IE5\WTAZWP2R\jump2[1].htm [DETECTION] Contains recognition pattern of the HTML/Rce.Gen HTML script virus [NOTE] The registration for this file was not remedied due to too many multiple detections. For a more exact analysis, please send us this file via Quarantine manager for closer examination. [NOTE] The registration for this file was not remedied due to too many multiple detections. For a more exact analysis, please send us this file via Quarantine manager for closer examination. [NOTE] The file was moved to the quarantine directory under the name '23726f93.qua'.C:\Documents and Settings\NetworkService.NT AUTHORITY\Local Settings\Temporary Internet Files\Content.IE5\WTAZWP2R\home[1].htm [DETECTION] Contains recognition pattern of the HTML/Rce.Gen HTML script virus [NOTE] The registration for this file was not remedied due to too many multiple detections. For a more exact analysis, please send us this file via Quarantine manager for closer examination. [NOTE] The registration for this file was not remedied due to too many multiple detections. For a more exact analysis, please send us this file via Quarantine manager for closer examination. [NOTE] The file was moved to the quarantine directory under the name '6ac57003.qua'.C:\Documents and Settings\NetworkService.NT AUTHORITY\Local Settings\Temporary Internet Files\Content.IE5\WTAZWP2R\controller[1].htm [DETECTION] Contains recognition pattern of the HTML/Rce.Gen HTML script virus [NOTE] The registration for this file was not remedied due to too many multiple detections. For a more exact analysis, please send us this file via Quarantine manager for closer examination. [NOTE] The registration for this file was not remedied due to too many multiple detections. For a more exact analysis, please send us this file via Quarantine manager for closer examination. [NOTE] The file was moved to the quarantine directory under the name '6c454cf1.qua'.C:\Documents and Settings\NetworkService.NT AUTHORITY\Local Settings\Temporary Internet Files\Content.IE5\WTAZWP2R\cities[1].htm [DETECTION] Contains recognition pattern of the HTML/Rce.Gen HTML script virus [NOTE] The registration for this file was not remedied due to too many multiple detections. For a more exact analysis, please send us this file via Quarantine manager for closer examination. [NOTE] The registration for this file was not remedied due to too many multiple detections. For a more exact analysis, please send us this file via Quarantine manager for closer examination. [NOTE] The file was moved to the quarantine directory under the name '014a558e.qua'.C:\Documents and Settings\NetworkService.NT AUTHORITY\Local Settings\Temporary Internet Files\Content.IE5\WTAZWP2R\CAT065X3.htm [DETECTION] Contains recognition pattern of the HTML/Rce.Gen HTML script virus [NOTE] The registration for this file was not remedied due to too many multiple detections. For a more exact analysis, please send us this file via Quarantine manager for closer examination. [NOTE] The registration for this file was not remedied due to too many multiple detections. For a more exact analysis, please send us this file via Quarantine manager for closer examination. [NOTE] The file was moved to the quarantine directory under the name '670f324f.qua'.C:\Documents and Settings\NetworkService.NT AUTHORITY\Local Settings\Temporary Internet Files\Content.IE5\WTAZWP2R\CASHAJK1.htm [DETECTION] Contains recognition pattern of the HTML/Crypted.Gen HTML script virus [NOTE] The file was moved to the quarantine directory under the name '62b935b2.qua'.C:\Documents and Settings\NetworkService.NT AUTHORITY\Local Settings\Temporary Internet Files\Content.IE5\WTAZWP2R\ADTECH;target=_blank;AdId=5568418;BnId=-1;;grp=[group][1].htm [DETECTION] Contains recognition pattern of the HTML/Rce.Gen HTML script virus [NOTE] The registration for this file was not remedied due to too many multiple detections. For a more exact analysis, please send us this file via Quarantine manager for closer examination. [NOTE] The registration for this file was not remedied due to too many multiple detections. For a more exact analysis, please send us this file via Quarantine manager for closer examination. [NOTE] The file was moved to the quarantine directory under the name '71ca4219.qua'.C:\Documents and Settings\NetworkService.NT AUTHORITY\Local Settings\Temporary Internet Files\Content.IE5\GXUV8XQB\jump1[1].htm [DETECTION] Contains recognition pattern of the HTML/Rce.Gen HTML script virus [NOTE] The registration for this file was not remedied due to too many multiple detections. For a more exact analysis, please send us this file via Quarantine manager for closer examination. [NOTE] The registration for this file was not remedied due to too many multiple detections. For a more exact analysis, please send us this file via Quarantine manager for closer examination. [NOTE] The file was moved to the quarantine directory under the name '27077a9e.qua'.C:\Documents and Settings\NetworkService.NT AUTHORITY\Local Settings\Temporary Internet Files\Content.IE5\GXUV8XQB\home[1].htm [DETECTION] Contains recognition pattern of the HTML/Rce.Gen HTML script virus [NOTE] The registration for this file was not remedied due to too many multiple detections. For a more exact analysis, please send us this file via Quarantine manager for closer examination. [NOTE] The registration for this file was not remedied due to too many multiple detections. For a more exact analysis, please send us this file via Quarantine manager for closer examination. [NOTE] The file was moved to the quarantine directory under the name '72243271.qua'.C:\Documents and Settings\NetworkService.NT AUTHORITY\Local Settings\Temporary Internet Files\Content.IE5\GXUV8XQB\data_sync[1].htm [DETECTION] Contains recognition pattern of the HTML/Rce.Gen HTML script virus [NOTE] The registration for this file was not remedied due to too many multiple detections. For a more exact analysis, please send us this file via Quarantine manager for closer examination. [NOTE] The registration for this file was not remedied due to too many multiple detections. For a more exact analysis, please send us this file via Quarantine manager for closer examination. [NOTE] The file was moved to the quarantine directory under the name '4e7f17bb.qua'.C:\Documents and Settings\NetworkService.NT AUTHORITY\Local Settings\Temporary Internet Files\Content.IE5\GXUV8XQB\checkBrowser[1].htm [DETECTION] Contains recognition pattern of the HTML/Rce.Gen HTML script virus [NOTE] The registration for this file was not remedied due to too many multiple detections. For a more exact analysis, please send us this file via Quarantine manager for closer examination. [NOTE] The registration for this file was not remedied due to too many multiple detections. For a more exact analysis, please send us this file via Quarantine manager for closer examination. [NOTE] The file was moved to the quarantine directory under the name '015f0cbd.qua'.C:\Documents and Settings\NetworkService.NT AUTHORITY\Local Settings\Temporary Internet Files\Content.IE5\GXUV8XQB\CAIJCHMN.htm [DETECTION] Contains recognition pattern of the HTML/Crypted.Gen HTML script virus [NOTE] The file was moved to the quarantine directory under the name '03d96c97.qua'.C:\Documents and Settings\NetworkService.NT AUTHORITY\Local Settings\Temporary Internet Files\Content.IE5\GXUV8XQB\activityi;src=2507573;type=ads-a681;cat=ads-a832;ord=1;num=5566581060542[1].htm [DETECTION] Contains recognition pattern of the HTML/Rce.Gen HTML script virus [NOTE] The registration for this file was not remedied due to too many multiple detections. For a more exact analysis, please send us this file via Quarantine manager for closer examination. [NOTE] The registration for this file was not remedied due to too many multiple detections. For a more exact analysis, please send us this file via Quarantine manager for closer examination. [NOTE] The file was moved to the quarantine directory under the name '75c81740.qua'.C:\Documents and Settings\NetworkService.NT AUTHORITY\Local Settings\Temporary Internet Files\Content.IE5\AIM3ND0E\x[1].htm [DETECTION] Contains recognition pattern of the HTML/Rce.Gen HTML script virus [NOTE] The registration for this file was not remedied due to too many multiple detections. For a more exact analysis, please send us this file via Quarantine manager for closer examination. [NOTE] The registration for this file was not remedied due to too many multiple detections. For a more exact analysis, please send us this file via Quarantine manager for closer examination. [NOTE] The file was moved to the quarantine directory under the name '49216b20.qua'.C:\Documents and Settings\NetworkService.NT AUTHORITY\Local Settings\Temporary Internet Files\Content.IE5\AIM3ND0E\rpc_relay[1].html [DETECTION] Contains recognition pattern of the HTML/Rce.Gen HTML script virus [NOTE] The registration for this file was not remedied due to too many multiple detections. For a more exact analysis, please send us this file via Quarantine manager for closer examination. [NOTE] The registration for this file was not remedied due to too many multiple detections. For a more exact analysis, please send us this file via Quarantine manager for closer examination. [NOTE] The file was moved to the quarantine directory under the name '73343494.qua'.C:\Documents and Settings\NetworkService.NT AUTHORITY\Local Settings\Temporary Internet Files\Content.IE5\AIM3ND0E\home[1].htm [DETECTION] Contains recognition pattern of the HTML/Rce.Gen HTML script virus [NOTE] The registration for this file was not remedied due to too many multiple detections. For a more exact analysis, please send us this file via Quarantine manager for closer examination. [NOTE] The registration for this file was not remedied due to too many multiple detections. For a more exact analysis, please send us this file via Quarantine manager for closer examination. [NOTE] The file was moved to the quarantine directory under the name '4ed34eef.qua'.C:\Documents and Settings\NetworkService.NT AUTHORITY\Local Settings\Temporary Internet Files\Content.IE5\AIM3ND0E\default[2].htm [DETECTION] Contains recognition pattern of the HTML/Rce.Gen HTML script virus [NOTE] The registration for this file was not remedied due to too many multiple detections. For a more exact analysis, please send us this file via Quarantine manager for closer examination. [NOTE] The registration for this file was not remedied due to too many multiple detections. For a more exact analysis, please send us this file via Quarantine manager for closer examination. [NOTE] The file was moved to the quarantine directory under the name '6bf4190a.qua'.C:\Documents and Settings\NetworkService.NT AUTHORITY\Local Settings\Temporary Internet Files\Content.IE5\AIM3ND0E\default[1].htm [DETECTION] Contains recognition pattern of the HTML/Rce.Gen HTML script virus [NOTE] The registration for this file was not remedied due to too many multiple detections. For a more exact analysis, please send us this file via Quarantine manager for closer examination. [NOTE] The registration for this file was not remedied due to too many multiple detections. For a more exact analysis, please send us this file via Quarantine manager for closer examination. [NOTE] The file was moved to the quarantine directory under the name '251206a0.qua'.C:\Documents and Settings\NetworkService.NT AUTHORITY\Local Settings\Temporary Internet Files\Content.IE5\AIM3ND0E\CA5J7QI1.htm [DETECTION] Contains recognition pattern of the HTML/Rce.Gen HTML script virus [NOTE] The registration for this file was not remedied due to too many multiple detections. For a more exact analysis, please send us this file via Quarantine manager for closer examination. [NOTE] The registration for this file was not remedied due to too many multiple detections. For a more exact analysis, please send us this file via Quarantine manager for closer examination. [NOTE] The file was moved to the quarantine directory under the name '348900b2.qua'.C:\Documents and Settings\NetworkService.NT AUTHORITY\Local Settings\Temporary Internet Files\Content.IE5\AIM3ND0E\backcookie[1].htm [DETECTION] Contains recognition pattern of the HTML/Rce.Gen HTML script virus [NOTE] The registration for this file was not remedied due to too many multiple detections. For a more exact analysis, please send us this file via Quarantine manager for closer examination. [NOTE] The registration for this file was not remedied due to too many multiple detections. For a more exact analysis, please send us this file via Quarantine manager for closer examination. [NOTE] The file was moved to the quarantine directory under the name '14b81af8.qua'.C:\Documents and Settings\NetworkService.NT AUTHORITY\Local Settings\Temporary Internet Files\Content.IE5\0TY5RWMF\subDirect[1].htm [DETECTION] Contains recognition pattern of the HTML/Rce.Gen HTML script virus [NOTE] The registration for this file was not remedied due to too many multiple detections. For a more exact analysis, please send us this file via Quarantine manager for closer examination. [NOTE] The registration for this file was not remedied due to too many multiple detections. For a more exact analysis, please send us this file via Quarantine manager for closer examination. [NOTE] The file was moved to the quarantine directory under the name '411c7c5a.qua'.C:\Documents and Settings\NetworkService.NT AUTHORITY\Local Settings\Temporary Internet Files\Content.IE5\0TY5RWMF\site=uken&affiliate=uken&app=prores&sapp=prores&size=120x90&pp=13&path=%2Fhome[1].htm [DETECTION] Contains recognition pattern of the HTML/Rce.Gen HTML script virus [NOTE] The registration for this file was not remedied due to too many multiple detections. For a more exact analysis, please send us this file via Quarantine manager for closer examination. [NOTE] The registration for this file was not remedied due to too many multiple detections. For a more exact analysis, please send us this file via Quarantine manager for closer examination. [NOTE] The file was moved to the quarantine directory under the name '1f97262f.qua'.C:\Documents and Settings\NetworkService.NT AUTHORITY\Local Settings\Temporary Internet Files\Content.IE5\0TY5RWMF\rpc_relay[2].html [DETECTION] Contains recognition pattern of the HTML/Rce.Gen HTML script virus [NOTE] The registration for this file was not remedied due to too many multiple detections. For a more exact analysis, please send us this file via Quarantine manager for closer examination. [NOTE] The registration for this file was not remedied due to too many multiple detections. For a more exact analysis, please send us this file via Quarantine manager for closer examination. [NOTE] The file was moved to the quarantine directory under the name '14bd6a83.qua'.C:\Documents and Settings\NetworkService.NT AUTHORITY\Local Settings\Temporary Internet Files\Content.IE5\0TY5RWMF\rpc_relay[1].html [DETECTION] Contains recognition pattern of the HTML/Rce.Gen HTML script virus [NOTE] The registration for this file was not remedied due to too many multiple detections. For a more exact analysis, please send us this file via Quarantine manager for closer examination. [NOTE] The registration for this file was not remedied due to too many multiple detections. For a more exact analysis, please send us this file via Quarantine manager for closer examination. [NOTE] The file was moved to the quarantine directory under the name '6dc84518.qua'.C:\Documents and Settings\NetworkService.NT AUTHORITY\Local Settings\Temporary Internet Files\Content.IE5\0TY5RWMF\RegistrationForm[1].htm [DETECTION] Contains recognition pattern of the HTML/Rce.Gen HTML script virus [NOTE] The registration for this file was not remedied due to too many multiple detections. For a more exact analysis, please send us this file via Quarantine manager for closer examination. [NOTE] The registration for this file was not remedied due to too many multiple detections. For a more exact analysis, please send us this file via Quarantine manager for closer examination. [NOTE] The file was moved to the quarantine directory under the name '6b171064.qua'.C:\Documents and Settings\NetworkService.NT AUTHORITY\Local Settings\Temporary Internet Files\Content.IE5\0TY5RWMF\monster1.0[1].htm [DETECTION] Contains recognition pattern of the HTML/Rce.Gen HTML script virus [NOTE] The registration for this file was not remedied due to too many multiple detections. For a more exact analysis, please send us this file via Quarantine manager for closer examination. [NOTE] The registration for this file was not remedied due to too many multiple detections. For a more exact analysis, please send us this file via Quarantine manager for closer examination. [NOTE] The file was moved to the quarantine directory under the name '156463af.qua'.C:\Documents and Settings\NetworkService.NT AUTHORITY\Local Settings\Temporary Internet Files\Content.IE5\0TY5RWMF\iframe[1].htm [DETECTION] Contains recognition pattern of the HTML/Rce.Gen HTML script virus [NOTE] The registration for this file was not remedied due to too many multiple detections. For a more exact analysis, please send us this file via Quarantine manager for closer examination. [NOTE] The registration for this file was not remedied due to too many multiple detections. For a more exact analysis, please send us this file via Quarantine manager for closer examination. [NOTE] The file was moved to the quarantine directory under the name '7c342ab4.qua'.C:\Documents and Settings\NetworkService.NT AUTHORITY\Local Settings\Temporary Internet Files\Content.IE5\0TY5RWMF\default[1].htm [DETECTION] Contains recognition pattern of the HTML/Rce.Gen HTML script virus [NOTE] The registration for this file was not remedied due to too many multiple detections. For a more exact analysis, please send us this file via Quarantine manager for closer examination. [NOTE] The registration for this file was not remedied due to too many multiple detections. For a more exact analysis, please send us this file via Quarantine manager for closer examination. [NOTE] The file was moved to the quarantine directory under the name '4cd27bef.qua'.C:\Documents and Settings\NetworkService.NT AUTHORITY\Local Settings\Temporary Internet Files\Content.IE5\0TY5RWMF\controller[1].htm [DETECTION] Contains recognition pattern of the HTML/Rce.Gen HTML script virus [NOTE] The registration for this file was not remedied due to too many multiple detections. For a more exact analysis, please send us this file via Quarantine manager for closer examination. [NOTE] The registration for this file was not remedied due to too many multiple detections. For a more exact analysis, please send us this file via Quarantine manager for closer examination. [NOTE] The file was moved to the quarantine directory under the name '317f3599.qua'.C:\Documents and Settings\NetworkService.NT AUTHORITY\Local Settings\Temporary Internet Files\Content.IE5\0TY5RWMF\cities[1].htm [DETECTION] Contains recognition pattern of the HTML/Rce.Gen HTML script virus [NOTE] The registration for this file was not remedied due to too many multiple detections. For a more exact analysis, please send us this file via Quarantine manager for closer examination. [NOTE] The registration for this file was not remedied due to too many multiple detections. For a more exact analysis, please send us this file via Quarantine manager for closer examination. [NOTE] The file was moved to the quarantine directory under the name '34f427c8.qua'.C:\Documents and Settings\NetworkService.NT AUTHORITY\Local Settings\Temporary Internet Files\Content.IE5\0TY5RWMF\CAGB7720.htm [DETECTION] Contains recognition pattern of the HTML/Crypted.Gen HTML script virus [NOTE] The file was moved to the quarantine directory under the name '16494882.qua'.C:\Documents and Settings\NetworkService.NT AUTHORITY\Local Settings\Temporary Internet Files\Content.IE5\0TY5RWMF\backcookie[1].htm [DETECTION] Contains recognition pattern of the HTML/Rce.Gen HTML script virus [NOTE] The registration for this file was not remedied due to too many multiple detections. For a more exact analysis, please send us this file via Quarantine manager for closer examination. [NOTE] The registration for this file was not remedied due to too many multiple detections. For a more exact analysis, please send us this file via Quarantine manager for closer examination. [NOTE] The file was moved to the quarantine directory under the name '767e6b7e.qua'.C:\Documents and Settings\NetworkService.NT AUTHORITY\Local Settings\Temporary Internet Files\Content.IE5\0TY5RWMF\ads[1].htm [DETECTION] Contains recognition pattern of the HTML/Rce.Gen HTML script virus [NOTE] The registration for this file was not remedied due to too many multiple detections. For a more exact analysis, please send us this file via Quarantine manager for closer examination. [NOTE] The registration for this file was not remedied due to too many multiple detections. For a more exact analysis, please send us this file via Quarantine manager for closer examination. [NOTE] The file was moved to the quarantine directory under the name '73fd79a6.qua'.C:\Documents and Settings\All Users\Application Data\DivX\RunAsUser\RUNASUSERPROCESS.dll [DETECTION] Contains recognition pattern of the W32/Infector.Gen2 Windows virus [NOTE] The registration for this file was not remedied due to too many multiple detections. For a more exact analysis, please send us this file via Quarantine manager for closer examination. [NOTE] The registration for this file was not remedied due to too many multiple detections. For a more exact analysis, please send us this file via Quarantine manager for closer examination. [NOTE] The file was moved to the quarantine directory under the name '57675266.qua'.C:\Documents and Settings\All Users\Application Data\Avira\AntiVir Desktop\addr_file.html [DETECTION] Contains recognition pattern of the HTML/Rce.Gen HTML script virus [NOTE] The registration for this file was not remedied due to too many multiple detections. For a more exact analysis, please send us this file via Quarantine manager for closer examination. [NOTE] The registration for this file was not remedied due to too many multiple detections. For a more exact analysis, please send us this file via Quarantine manager for closer examination. [NOTE] The file was moved to the quarantine directory under the name '25b04797.qua'.C:\Documents and Settings\All Users\Application Data\Adobe\Photoshop Album\3.2\upsellCache\organize.html [DETECTION] Contains recognition pattern of the HTML/Rce.Gen HTML script virus [NOTE] The registration for this file was not remedied due to too many multiple detections. For a more exact analysis, please send us this file via Quarantine manager for closer examination. [NOTE] The registration for this file was not remedied due to too many multiple detections. For a more exact analysis, please send us this file via Quarantine manager for closer examination. [NOTE] The file was moved to the quarantine directory under the name '64d7228a.qua'.C:\Documents and Settings\All Users\Application Data\Adobe\Photoshop Album\3.2\upsellCache\fix.html [DETECTION] Contains recognition pattern of the HTML/Rce.Gen HTML script virus [NOTE] The registration for this file was not remedied due to too many multiple detections. For a more exact analysis, please send us this file via Quarantine manager for closer examination. [NOTE] The registration for this file was not remedied due to too many multiple detections. For a more exact analysis, please send us this file via Quarantine manager for closer examination. [NOTE] The file was moved to the quarantine directory under the name '350c533a.qua'.C:\Documents and Settings\All Users\Application Data\Adobe\Photoshop Album\3.2\upsellCache\creation.html [DETECTION] Contains recognition pattern of the HTML/Rce.Gen HTML script virus [NOTE] The registration for this file was not remedied due to too many multiple detections. For a more exact analysis, please send us this file via Quarantine manager for closer examination. [NOTE] The registration for this file was not remedied due to too many multiple detections. For a more exact analysis, please send us this file via Quarantine manager for closer examination. [NOTE] The file was moved to the quarantine directory under the name '44a953ea.qua'.C:\Documents and Settings\All Users\Application Data\Adobe\Photoshop Album\3.2\upsellCache\calendar.html [DETECTION] Contains recognition pattern of the HTML/Rce.Gen HTML script virus [NOTE] The registration for this file was not remedied due to too many multiple detections. For a more exact analysis, please send us this file via Quarantine manager for closer examination. [NOTE] The registration for this file was not remedied due to too many multiple detections. For a more exact analysis, please send us this file via Quarantine manager for closer examination. [NOTE] The file was moved to the quarantine directory under the name '252c52a7.qua'.C:\Behringer\BCD2000\1.0.0.6\bcd2kcpan.exe [DETECTION] Contains recognition pattern of the W32/Infector.Gen2 Windows virus [NOTE] The registration for this file was not remedied due to too many multiple detections. For a more exact analysis, please send us this file via Quarantine manager for closer examination. [NOTE] The registration for this file was not remedied due to too many multiple detections. For a more exact analysis, please send us this file via Quarantine manager for closer examination. [NOTE] The file was moved to the quarantine directory under the name '0a9274de.qua'.C:\Behringer\BCD2000\1.0.0.6\bcd2kasio.dll [DETECTION] Contains recognition pattern of the W32/Infector.Gen2 Windows virus [NOTE] The registration for this file was not remedied due to too many multiple detections. For a more exact analysis, please send us this file via Quarantine manager for closer examination. [NOTE] The registration for this file was not remedied due to too many multiple detections. For a more exact analysis, please send us this file via Quarantine manager for closer examination. [NOTE] The file was moved to the quarantine directory under the name '4283590e.qua'.C:\ATI\SUPPORT\8-4_xp32_dd_60999\XP_INF\B_61998\atiiiexx.dll [DETECTION] Contains recognition pattern of the W32/Infector.Gen2 Windows virus [NOTE] The registration for this file was not remedied due to too many multiple detections. For a more exact analysis, please send us this file via Quarantine manager for closer examination. [NOTE] The registration for this file was not remedied due to too many multiple detections. For a more exact analysis, please send us this file via Quarantine manager for closer examination. [NOTE] The file was moved to the quarantine directory under the name '1ffa5704.qua'.C:\ATI\SUPPORT\8-4_xp32_dd_60999\Driver.DLL [DETECTION] Contains recognition pattern of the W32/Infector.Gen2 Windows virus [NOTE] The registration for this file was not remedied due to too many multiple detections. For a more exact analysis, please send us this file via Quarantine manager for closer examination. [NOTE] The registration for this file was not remedied due to too many multiple detections. For a more exact analysis, please send us this file via Quarantine manager for closer examination. [NOTE] The file was moved to the quarantine directory under the name '53c014ac.qua'.C:\AddOn\Recovery-Info.htm [DETECTION] Contains recognition pattern of the HTML/Rce.Gen HTML script virus [NOTE] The registration for this file was not remedied due to too many multiple detections. For a more exact analysis, please send us this file via Quarantine manager for closer examination. [NOTE] The registration for this file was not remedied due to too many multiple detections. For a more exact analysis, please send us this file via Quarantine manager for closer examination. [NOTE] The file was moved to the quarantine directory under the name '502e771f.qua'.C:\Program Files\QuickTime\QTTask.exe [DETECTION] Contains recognition pattern of the W32/Infector.Gen2 Windows virus [NOTE] The registration for this file was not remedied due to too many multiple detections. For a more exact analysis, please send us this file via Quarantine manager for closer examination. [NOTE] The registration for this file was not remedied due to too many multiple detections. For a more exact analysis, please send us this file via Quarantine manager for closer examination. [NOTE] The file was moved to the quarantine directory under the name '5c190ede.qua'.C:\Program Files\K-Lite Codec Pack\Filters\Haali\dxr.dll [DETECTION] Contains recognition pattern of the W32/Infector.Gen2 Windows virus [NOTE] The registration for this file was not remedied due to too many multiple detections. For a more exact analysis, please send us this file via Quarantine manager for closer examination. [NOTE] The registration for this file was not remedied due to too many multiple detections. For a more exact analysis, please send us this file via Quarantine manager for closer examination. [NOTE] The file was moved to the quarantine directory under the name '7b661205.qua'.C:\PROGRA~1\Creative\SHARED~1\CtCmeCtx.dll [DETECTION] Contains recognition pattern of the W32/Infector.Gen2 Windows virus [WARNING] The file could not be copied to quarantine! [WARNING] The file does not exist! [NOTE] The registration for this file was not remedied due to too many multiple detections. For a more exact analysis, please send us this file via Quarantine manager for closer examination. [NOTE] The file is scheduled for deleting after reboot.C:\Program Files\Creative\Creative Zen Vision M\SHCTMTP.dll [DETECTION] Contains recognition pattern of the W32/Infector.Gen2 Windows virus [NOTE] The registration for this file was not remedied due to too many multiple detections. For a more exact analysis, please send us this file via Quarantine manager for closer examination. [NOTE] The registration for this file was not remedied due to too many multiple detections. For a more exact analysis, please send us this file via Quarantine manager for closer examination. [NOTE] The file was moved to the quarantine directory under the name '32a407bd.qua'.C:\Program Files\Windows Media Player\wmpnetwk.exe [DETECTION] Contains recognition pattern of the W32/Infector.Gen2 Windows virus [NOTE] The registration for this file was not remedied due to too many multiple detections. For a more exact analysis, please send us this file via Quarantine manager for closer examination. [NOTE] The registration for this file was not remedied due to too many multiple detections. For a more exact analysis, please send us this file via Quarantine manager for closer examination. [NOTE] The file was moved to the quarantine directory under the name '19ba44fd.qua'.C:\Program Files\Common Files\Sony Shared\AVLib\SPTISRV.exe [DETECTION] Contains recognition pattern of the W32/Infector.Gen2 Windows virus [NOTE] The registration for this file was not remedied due to too many multiple detections. For a more exact analysis, please send us this file via Quarantine manager for closer examination. [NOTE] The registration for this file was not remedied due to too many multiple detections. For a more exact analysis, please send us this file via Quarantine manager for closer examination. [NOTE] The file was moved to the quarantine directory under the name '6df31506.qua'.C:\Program Files\Common Files\InstallShield\Driver\1150\Intel 32\IDriverT.exe [DETECTION] Contains recognition pattern of the W32/Infector.Gen2 Windows virus [NOTE] The registration for this file was not remedied due to too many multiple detections. For a more exact analysis, please send us this file via Quarantine manager for closer examination. [NOTE] The registration for this file was not remedied due to too many multiple detections. For a more exact analysis, please send us this file via Quarantine manager for closer examination. [NOTE] The file was moved to the quarantine directory under the name '05f13290.qua'.The repair notes were written to the file 'C:\avrescue\rescue.avp'.

Synchro89,-----------------------------------------------------------Unfortunately, you have a very dangerous, catastrophic infection, with "backdoor" capabilities. This allows intruders to remotely control the computer, log keystrokes, steal critical system information, and download and execute files of their own.

Get this machine OFF the Internet. It can infect others.

If you do any banking or other financial transactions on the PC, or if it should contain any other sensitive information, please get to a known clean computer and change all passwords where applicable. This would include contacts like your Internet Provider, email, banks, financial accounts, PayPal, eBay, online companies, and any online forums or groups to which you belong.

It would be wise to contact any of the financial institutions directly and apprise them of your situation.

Do NOT change passwords or do any transactions while using the infected computer because the intruder may get the new passwords and transaction information.

In this case, the infection is known as a file infector. It corrupts possibly hundreds of system files, so there isNO REMEDY except to either do aCOMPLETE RECOVERY, using the Manufacturer's option at bootup, or a complete "reformat/re-install" of Windows. Performing a complete disk reformat and fresh installation of windows will work, if you have an installation disk.Only an option that puts the machine back into its "as purchased" state will work. Any "Repair install" or similar will fail.

If you don't have a Windows system disk, you may be able to get one at reasonable cost from the manufacturer.AT THIS TIME, I WOULD NOT ATTEMPT TO USE ANY BACKUPS FOR ANY PURPOSE, EVEN AFTER A COMPLETE RECOVERY.The only safe programs to re-install would be from original installation CDs.

Who is online

Advertisements do not imply our endorsement of that product or service. Register to remove all ads. The forum is run by volunteers who donate their time and expertise. We make every attempt to ensure that the help and advice posted is accurate and will not cause harm to your computer. However, we do not guarantee that they are accurate and they are to be used at your own risk. All trademarks are the property of their respective owners.